Compare ThreatLocker Platform and Todyl Security Platform

At a Glance
ThreatLocker Platform
ThreatLocker Platform
Star Rating
(473)4.8 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
Todyl Security Platform
Todyl Security Platform
Star Rating
(96)4.6 out of 5
Market Segments
Small-Business (88.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Todyl Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Todyl Security Platform excels in providing a comprehensive solution that simplifies security management. Users appreciate its ability to consolidate various security functions into a single platform, making it easier to manage and scale, as one user noted, "I like Todyl because it simplifies what’s usually a fragmented approach to security and networking."
  • Users say that ThreatLocker Platform stands out for its effective Zero-Trust enforcement, which has proven successful in blocking real threats without relying on traditional antivirus signatures. One reviewer highlighted, "I love how ThreatLocker Platform implements effective Zero-Trust enforcement by adhering to the principle of 'trust nothing unless explicitly allowed'."
  • Reviewers mention that Todyl Security Platform offers exceptional support, with many praising the dedicated resources available 24/7 through a Slack channel. This level of support is a significant advantage for users who value responsive assistance, as one user stated, "Support is one of the best I have seen."
  • According to verified reviews, ThreatLocker Platform is favored for its user-friendly interface, which simplifies the management of security settings. Users appreciate how easy it is to navigate, with one reviewer noting, "What I like most about the ThreatLocker Platform is the easy interface."
  • G2 reviewers report that Todyl Security Platform has a strong focus on security analytics, receiving high praise for its proactive threat hunting capabilities. Users have expressed satisfaction with features that enhance their security posture, stating, "Todyl is essential to our team," highlighting its value in day-to-day operations.
  • Users say that while ThreatLocker Platform has a robust application control feature, Todyl Security Platform offers better integration capabilities, with reviewers noting its API and integrations score as a strong point. This flexibility allows users to tailor their security solutions to fit their specific needs, making it a preferred choice for those looking for customization.
Pricing
Entry-Level Pricing
ThreatLocker Platform
Enterprise
Free Trial
Browse all 2 pricing plans
Todyl Security Platform
No pricing available
Free Trial
ThreatLocker Platform
Free Trial is available
Todyl Security Platform
No trial information available
Ratings
Meets Requirements
9.5
146
9.2
76
Ease of Use
8.3
284
8.6
77
Ease of Setup
8.5
270
8.8
77
Ease of Admin
8.6
138
8.7
74
Quality of Support
9.7
145
9.4
75
Has the product been a good partner in doing business?
9.7
136
9.4
72
Product Direction (% positive)
9.7
139
9.7
76
Features by Category
7.9
8
8.7
27
Network Management
Feature Not Available
8.9
22
Feature Not Available
7.4
20
8.1
7
9.1
23
6.9
6
8.5
25
Security
8.5
8
9.2
25
8.1
7
8.9
22
7.8
6
8.9
22
8.1
7
9.0
21
Identity Management
8.6
7
8.7
22
7.1
7
8.3
20
8.3
7
8.6
22
Generative AI
Feature Not Available
Feature Not Available
Feature Not Available
Feature Not Available
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Analysis
Not enough data
8.7
5
Not enough data
Not enough data
Not enough data
8.7
5
Functionality
Not enough data
7.3
5
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
8.3
5
Not enough data
7.0
5
Not enough data
Not enough data
Not enough data
8.7
5
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.7
85
9.5
8
Administration
9.3
62
Not enough data
8.4
51
Not enough data
9.8
75
Not enough data
8.1
53
Not enough data
8.6
60
Not enough data
Functionality
9.3
53
9.3
5
9.0
54
Not enough data
9.0
26
Not enough data
8.7
50
9.7
6
Analysis
8.1
19
Not enough data
7.8
26
Not enough data
8.5
52
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
10.0
12
Detection & Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
10.0
5
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
10.0
5
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Not enough data
8.3
21
Management
Not enough data
7.9
18
Not enough data
7.9
18
Not enough data
8.7
18
Not enough data
8.9
20
Monitoring
Not enough data
7.6
15
Not enough data
7.5
17
Not enough data
9.0
20
Protection
Not enough data
9.1
20
Not enough data
8.2
16
Not enough data
8.6
18
Not enough data
8.8
16
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
8.8
16
8.9
50
Platform Features
9.5
16
9.5
44
8.9
14
9.1
36
9.6
16
8.1
30
8.8
14
9.1
33
9.1
15
9.7
39
7.7
14
7.6
33
Not enough data
9.9
18
Automation Capabilities
8.3
14
8.5
32
8.2
14
8.7
29
Not enough data
Not enough data
Not enough data
Not enough data
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control and Authentication - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Performance and Management - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.0
19
Components - Secure Access Service Edge (SASE)
Not enough data
9.3
15
Not enough data
Not enough data
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
10.0
7
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
8.0
5
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
9.7
5
Not enough data
Not enough data
8.9
11
Not enough data
Identity and Access Management - Zero Trust Platforms
7.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Reporting and Policies - Zero Trust Platforms
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.4
6
Services - Endpoint Detection & Response (EDR)
Not enough data
9.4
6
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
Not enough data
8.9
49
Network Management
Not enough data
9.4
44
Not enough data
8.2
31
Not enough data
9.3
40
Incident Management
Not enough data
9.3
44
Not enough data
9.2
40
Not enough data
9.0
42
Security Intelligence
Not enough data
9.3
39
Not enough data
7.9
33
Not enough data
8.5
32
Not enough data
8.9
33
Agentic AI - Security Information and Event Management (SIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Security Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
ThreatLocker Platform
ThreatLocker Platform
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
13.3%
Todyl Security Platform
Todyl Security Platform
Small-Business(50 or fewer emp.)
88.6%
Mid-Market(51-1000 emp.)
10.1%
Enterprise(> 1000 emp.)
1.3%
Reviewers' Industry
ThreatLocker Platform
ThreatLocker Platform
Information Technology and Services
34.5%
Computer & Network Security
18.5%
Hospital & Health Care
4.2%
Financial Services
3.6%
Accounting
2.7%
Other
36.4%
Todyl Security Platform
Todyl Security Platform
Information Technology and Services
52.6%
Computer & Network Security
35.9%
Consulting
2.6%
Security and Investigations
1.3%
Legal Services
1.3%
Other
6.4%
Alternatives
ThreatLocker Platform
ThreatLocker Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Todyl Security Platform
Todyl Security Platform Alternatives
Huntress Managed EDR
Huntress Managed EDR
Add Huntress Managed EDR
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos MDR
Sophos MDR
Add Sophos MDR
Discussions
ThreatLocker Platform
ThreatLocker Platform Discussions
Does ThreatLocker work on Mac?
2 Comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 Comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 Comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more
Todyl Security Platform
Todyl Security Platform Discussions
Monty the Mongoose crying
Todyl Security Platform has no discussions with answers